Health empowerment through activity trackers: An empirical smart wristband study

EC Nelson, T Verhagen, ML Noordzij - Computers in human behavior, 2016 - Elsevier
The increasing popularity of activity trackers has shown a remarkable shift in human
computer interaction; individuals seem willing to wear a device that constantly tracks health …

Auditing organizational communication

O Hargie, D Tourish - London: Routlege, 2009 - api.taylorfrancis.com
There has been an enormous growth of interest in the field of organizational communication
since the first edition of this book was published. In part, this is because the volume and …

Designing email tasks for the Business English classroom: Implications from a study of Hong Kong's key industries

S Evans - English for Specific Purposes, 2012 - Elsevier
Email has revolutionised the way in which professionals work and companies operate, and
yet has received surprisingly little scholarly attention in English for Specific Purposes and …

Style used in electronic mail

R Mallon, C Oppenheim - Aslib Proceedings, 2002 - emerald.com
Begins by reviewing relevant literature to identify some of the features that are said to
appear exclusively in e‐mails. Also highlights the main issues in the debate between those …

The impact of social influence on the perceived helpfulness of online consumer reviews

H Risselada, L de Vries, M Verstappen - European Journal of …, 2018 - emerald.com
Purpose This study aims to study to what extent the helpfulness votes others attach to a
review affect a consumer's perceived helpfulness of that review. In addition, the purpose of …

The influence of workload and civility of treatment on the perpetration of email incivility

L Francis, CM Holmvall, LE O'brien - Computers in Human Behavior, 2015 - Elsevier
The consequences of experienced incivility at work are well documented. However, less is
known about causal factors of incivility. Using an experimental design, we investigated the …

Analysing e-mail text authorship for forensic purposes

MW Corney - 2003 - eprints.qut.edu.au
E-mail has become the most popular Internet application and with its rise in use has come
an inevitable increase in the use of e-mail for criminal purposes. It is possible for an e-mail …

Intentional and unintentional consequences of substituting face-to-face interaction with e-mail: An employee-based perspective

P O'Kane, O Hargie - Interacting with computers, 2007 - ieeexplore.ieee.org
In this article, we undertake empirical research into e-mail communication in the workplace
to provide organizations with practical information about how employees can effectively …

Assessing the information quality of phishing-related content on financial institutions' websites

R Butler, M Butler - Information & Computer Security, 2018 - emerald.com
Purpose Phishing attacks exploit social vulnerabilities and remain a global concern.
Financial institutions often use their websites as part of their online awareness and …

Identifying the authors of suspect email

MW Corney, AM Anderson, GM Mohay, O de Vel - 2001 - eprints.qut.edu.au
In this paper, we present the results of an investigation into identifying the authorship of
email messages by analysis of the contents and style of the email messages themselves. A …